summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--host_vars/ff-nat6418
-rw-r--r--inventory.ini3
-rw-r--r--roles/configure_iptables/templates/ip6tables.rules11
-rw-r--r--roles/configure_iptables/templates/iptables.rules8
-rw-r--r--roles/install_babeld/templates/babeld.conf.j28
-rw-r--r--roles/install_wireguard_backbone/tasks/main.yml2
-rw-r--r--roles/install_wireguard_backbone/tasks/uplink_tasks.yml29
-rw-r--r--setup_fastd.yml23
8 files changed, 5 insertions, 97 deletions
diff --git a/host_vars/ff-nat64 b/host_vars/ff-nat64
deleted file mode 100644
index 2209208..0000000
--- a/host_vars/ff-nat64
+++ /dev/null
@@ -1,18 +0,0 @@
----
-ansible_host: 2a01:4f8:a0:9395:2::3
-#ansible_host: 10.0.4.67
-wireguard_bb_name: 'nat64'
-wireguard_bb_endpoint: '2a01:4f8:a0:9395:2::3'
-wireguard_bb_priv_key: !vault |
- $ANSIBLE_VAULT;1.1;AES256
- 39303530363738363764303964346631313532353762343263316166383534373763303538376363
- 3733366465336331353939346464306162353938353666370a613166623931613430613333613139
- 63356231653035663232376330363763393732666135356639663537666534326136356431663264
- 6330643965613562380a623830616437653563613630663332313266623239373634643431313064
- 62306263343934616462356536613235363866303736636537633766616663346363326234323532
- 3862346431613738663665613661623236323139616639613432
-wireguard_bb_pub_key: '4f3BbS38u97CNN3LDUZS//vO3JTzAl6zRWovuIAGcQM='
-wireguard_bb_ipv4: '10.222.0.6'
-wireguard_bb_ipv6: 'fe80::ffbb:ffbb:6'
-wireguard_bb_port: 10106
-preferred_uplink: 'uplink2'
diff --git a/inventory.ini b/inventory.ini
index 8a9f617..98fbaa1 100644
--- a/inventory.ini
+++ b/inventory.ini
@@ -28,6 +28,3 @@ ff-uplink2
[uplink:children]
mullvad_uplink
ffrl_uplink
-
-[nat64]
-ff-nat64
diff --git a/roles/configure_iptables/templates/ip6tables.rules b/roles/configure_iptables/templates/ip6tables.rules
index c1e5b4c..0f8c50f 100644
--- a/roles/configure_iptables/templates/ip6tables.rules
+++ b/roles/configure_iptables/templates/ip6tables.rules
@@ -10,7 +10,7 @@
{% endfor %}
{% endif %}
-{% if 'fastd' in group_names or 'nat64' in group_names %}
+{% if 'fastd' in group_names %}
{% for peer in groups['uplink'] %}
-A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} ! -s fe80::/64 ! -d fe80::/64 -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
@@ -19,9 +19,6 @@
{% for peer in groups['fastd'] %}
-A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} ! -s fe80::/64 ! -d fe80::/64 -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
-{% for peer in groups['nat64'] %}
--A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} ! -s fe80::/64 ! -d fe80::/64 -j MARK --set-xmark 0x1/0xffffffff
-{% endfor %}
{% for peer in groups['uplink'] | difference([inventory_hostname]) %}
-A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} ! -s fe80::/64 ! -d fe80::/64 -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
@@ -63,7 +60,7 @@ COMMIT
{% endfor %}
{% endif %}
# wireguard_backbone
-{% if 'fastd' in group_names or 'nat64' in group_names %}
+{% if 'fastd' in group_names %}
{% for peer in groups['uplink'] %}
-A INPUT -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -p udp --dport 6696 -j ACCEPT
-A INPUT -p udp --dport {{ hostvars[peer]['wireguard_bb_port'] }} -j ACCEPT
@@ -74,10 +71,6 @@ COMMIT
-A INPUT -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -p udp --dport 6696 -j ACCEPT
-A INPUT -p udp --dport {{ hostvars[peer]['wireguard_bb_port'] }} -j ACCEPT
{% endfor %}
-{% for peer in groups['nat64'] %}
--A INPUT -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -p udp --dport 6696 -j ACCEPT
--A INPUT -p udp --dport {{ hostvars[peer]['wireguard_bb_port'] }} -j ACCEPT
-{% endfor %}
{% for peer in groups['uplink'] | difference([inventory_hostname]) %}
-A INPUT -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -p udp --dport 6696 -j ACCEPT
-A INPUT -p udp --dport {{ hostvars[peer]['wireguard_bb_port'] }} -j ACCEPT
diff --git a/roles/configure_iptables/templates/iptables.rules b/roles/configure_iptables/templates/iptables.rules
index bd2fcf2..6f40af8 100644
--- a/roles/configure_iptables/templates/iptables.rules
+++ b/roles/configure_iptables/templates/iptables.rules
@@ -19,9 +19,6 @@
{% for peer in groups['fastd'] %}
-A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
-{% for peer in groups['nat64'] %}
--A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -j MARK --set-xmark 0x1/0xffffffff
-{% endfor %}
{% for peer in groups['uplink'] | difference([inventory_hostname]) %}
-A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
@@ -29,11 +26,6 @@
-A PREROUTING -i bb{{ peer.name }} -j MARK --set-xmark 0x1/0xffffffff
{% endfor %}
{% endif %}
-{% if 'nat64' in group_names %}
-{% for peer in groups['uplink'] %}
--A PREROUTING -i bb{{ hostvars[peer]['wireguard_bb_name'] }} -j MARK --set-xmark 0x1/0xffffffff
-{% endfor %}
-{% endif %}
COMMIT
*filter
:INPUT DROP [0:0]
diff --git a/roles/install_babeld/templates/babeld.conf.j2 b/roles/install_babeld/templates/babeld.conf.j2
index 88ba346..d714158 100644
--- a/roles/install_babeld/templates/babeld.conf.j2
+++ b/roles/install_babeld/templates/babeld.conf.j2
@@ -5,7 +5,7 @@
ipv6-subtrees true
# You must provide at least one interface for babeld to operate on.
-{% if ('fastd' in group_names) or ('nat64' in group_names) %}
+{% if ('fastd' in group_names) %}
{% for peer in groups['uplink'] %}
interface bb{{ hostvars[peer]['wireguard_bb_name'] }}
{% endfor %}
@@ -14,9 +14,6 @@ interface bb{{ hostvars[peer]['wireguard_bb_name'] }}
{% for peer in groups['fastd'] %}
interface bb{{ hostvars[peer]['wireguard_bb_name'] }}
{% endfor %}
-{% for peer in groups['nat64'] %}
-interface bb{{ hostvars[peer]['wireguard_bb_name'] }}
-{% endfor %}
{% for peer in groups['uplink'] | difference([inventory_hostname]) %}
interface bb{{ hostvars[peer]['wireguard_bb_name'] }}
{% endfor %}
@@ -45,7 +42,6 @@ in ip 10.30.0.0/18 allow
in ip 10.222.0.0/16 allow
in ip 2a03:2260:1016::/48 allow
in ip 2003:46:e028::/48 allow # finzelberg
-in ip 64:ff9b::/96 allow # nat64
in ip fd62:44e1:da::/48 allow
in deny # ignore default routes on uplinks
{% endif %}
@@ -67,7 +63,7 @@ redistribute ip 64:ff9b::/96 allow
redistribute ip fd62:44e1:da::/48 allow
redistribute local deny
-{% if ('fastd' in group_names or 'nat64' in group_names) and preferred_uplink is defined %}
+{% if ('fastd' in group_names) and preferred_uplink is defined %}
{% for peer in groups['uplink'] %}
{% if not hostvars[peer]['wireguard_bb_name'] == preferred_uplink %}
in if bb{{ hostvars[peer]['wireguard_bb_name'] }} metric 64
diff --git a/roles/install_wireguard_backbone/tasks/main.yml b/roles/install_wireguard_backbone/tasks/main.yml
index 24facda..630e82c 100644
--- a/roles/install_wireguard_backbone/tasks/main.yml
+++ b/roles/install_wireguard_backbone/tasks/main.yml
@@ -5,7 +5,7 @@
dest: /etc/systemd/system/wgbackbone@.service
- include_tasks: fastd_tasks.yml
- when: "('fastd' in group_names) or ('nat64' in group_names)"
+ when: "('fastd' in group_names)"
- include_tasks: uplink_tasks.yml
when: "'uplink' in group_names"
diff --git a/roles/install_wireguard_backbone/tasks/uplink_tasks.yml b/roles/install_wireguard_backbone/tasks/uplink_tasks.yml
index 357fa0b..ea906e5 100644
--- a/roles/install_wireguard_backbone/tasks/uplink_tasks.yml
+++ b/roles/install_wireguard_backbone/tasks/uplink_tasks.yml
@@ -6,13 +6,6 @@
mode: 0400
with_items: "{{ groups['fastd'] }}"
-- name: create wireguard config for nat64
- template:
- src: wg.conf.j2
- dest: /etc/wireguard/wgbb{{ hostvars[item]['wireguard_bb_name'] }}.conf
- mode: 0400
- with_items: "{{ groups['nat64'] }}"
-
- name: create wireguard config for uplinks
template:
src: wg.conf.j2
@@ -34,13 +27,6 @@
mode: 0744
with_items: "{{ groups['fastd'] }}"
-- name: create wireguard up scripts for nat64
- template:
- src: up.sh.j2
- dest: /etc/wireguard/upbb{{ hostvars[item]['wireguard_bb_name'] }}.sh
- mode: 0744
- with_items: "{{ groups['nat64'] }}"
-
- name: create wireguard up scripts for uplinks
template:
src: up.sh.j2
@@ -62,13 +48,6 @@
mode: 0744
with_items: "{{ groups['fastd'] }}"
-- name: create wireguard down scripts for nat64
- template:
- src: down.sh.j2
- dest: /etc/wireguard/downbb{{ hostvars[item]['wireguard_bb_name'] }}.sh
- mode: 0744
- with_items: "{{ groups['nat64'] }}"
-
- name: create wireguard down scripts for uplinks
template:
src: down.sh.j2
@@ -91,14 +70,6 @@
daemon_reload: yes
with_items: "{{ groups['fastd'] }}"
-- name: start and enable wireguard mesh for nat64
- systemd:
- name: wgbackbone@{{ hostvars[item]['wireguard_bb_name'] }}.service
- enabled: yes
- state: started
- daemon_reload: yes
- with_items: "{{ groups['nat64'] }}"
-
- name: start and enable wireguard mesh for uplinks
systemd:
name: wgbackbone@{{ hostvars[item]['wireguard_bb_name'] }}.service
diff --git a/setup_fastd.yml b/setup_fastd.yml
index d9d237b..b6798e5 100644
--- a/setup_fastd.yml
+++ b/setup_fastd.yml
@@ -79,26 +79,3 @@
user: root
roles:
- setup_ffrl_tunnel
-- name: setup nat64
- hosts: nat64
- user: root
- roles:
- - configure_journald
- - configure_sysctl
- - configure_iptables
- - configure_static_routes
- #- install_ssmtp
- - install_cronie
- #- install_php
- #- install_nginx
- - install_ntp
- - install_haveged
- #- setup_batman
- #- install_bind
- - install_wireguard
- - install_wireguard_backbone
- - install_babeld
- - install_monitoring
- - install_iperf3
- - update_ssh_keys
- - install_admin_packages